Temple University

Week 6 Reading Summary, Question, and recent Cyber Security News…

  1. Summarize one key point from each assigned reading…

Packet sniffing in a switched network environment will usually be implemented by a man-in-the-middle attack (active user data eavesdropping captured by the attacking PC using software such as “Cain.”) Best ways to protect against packet sniffing are the following: high encryption between PCs (SSH client software, IPsec setup within OSes, and logically segmented networks via virtual LAN implementations.

  1. Question to classmates (facilitates discussion) from assigned reading…

How to best secure Wi-Fi access against packet sniffing by hacker (example: hacker may use Wireshark software [freeware LAN analyzer used to passively capture 802.11 packets transmitted over Wi-Fi])?

*NOTE: Answer is the following: use latest WPA2-AES (at least 256 bit encryption) with excellent passphrase (character length at least 15-characters using combo of lower-case & upper-case letters including other keyboard symbols) to better secure 802.11 based wireless network access.

  1. Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…

In the Cyber Security News lately (reported by eHackingNews.com on 3/30/2015)…

Security flaw in hotel Wi-Fi could allow hackers to infect guests systems with malware…

                www.ehackingnews.com/2015/03/security-flaw-in-hotel-wi-fi-could.html?m=1

… ANTlabs InnGate Wi-Fi devices used by hotels vulnerability (remote access obtained via unauthorized RSYNC daemon running on TCP-873 port, and then attacker has R+W access within Linux OS [can create root level user, install malware for Wi-Fi hotel victims download, etc.]) How to mitigate this system vulnerability? Block unauthorized RSYNC (TCP-Deny port 873.)

 

Leave a Reply

Your email address will not be published. Required fields are marked *